Escolar Documentos
Profissional Documentos
Cultura Documentos
Implementation
Andysah Putera Utama Siahaan
Faculty of Computer Science
Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
andiesiahaan@gmail.com
Abstract - The human fingerprint always becomes the way
to verify the originality of the ownership. It can be
connected to the security methods to increase the security
level. Hill Cipher in one of the cryptography algorithms
that can attach the digital fingerprint pattern. There are
several matrix sizes to implement its process. This study
focuses to a 3x3 matrix in the application. We need to
provide nine integer numbers to perform the encryption
which determinant has already been tested before. We try
to link the digital fingerprint pattern to produce the
automatic key generator. Not all the determinant value can
get the ciphertext back to the original message. A threshold
is used to adjust the determinant. It produces the different
numbers when to be shifted. The correct numbers will be
occupied in the matrix. When the numbers are available,
the cryptography process can be performed.
II. THEORIES
A. Digital Fingerprint
A pattern of the fingerprint is generated when the finger is
pressed against a smooth surface. The most obvious structural
characteristics of the fingerprint are ridges and valleys. They
often run parallel, but they may bifurcate or terminate
unexpectedly sometimes [3]. Fingerprints are the curved
pattern in the skin fingertips. These streaks are not similar
among human being although they are identical. So that
fingerprints can be used to identify a person validity. Electronic
scanners capture the fingerprints based on light reflections of
the finger's ridges and valleys, ultrasonics, or the electrical
properties of the finger's ridges and valleys [4].
B. Hill Cipher
Hill Cipher is one of the symmetric key cryptographic
algorithms in data encryption [1]. To avoid the key matrix is
not invertible, matrix keys are generated using a binomial
coefficients newton. The encryption process and descriptions
use the same key. The plaintext itself may use image, audio or
text. Hill Cipher algorithm uses a matrix of m x m as a key for
encryption and decryption. The basic theory of matrix used in
Hill Cipher include the multiplication between the matrix and
perform the inverse of the matrix. It is an application of
cryptography modulo arithmetic.
Hill Cipher invented by Lester S. Hill in 1929 [5]. This
cryptographic technique was created to produce the cipher text
that cannot be solved by using frequency analysis techniques.
It does not replace the plaintext alphabet with another for the
same ciphertext. Hill Cipher is a block cipher as well. The
plaintext will be divided into several blocks of a certain size.
Each character in the block will affect the other characters in
the encryption and decryption process. The same characters in
plaintext are not mapped to the same character in the ciphertext.
Hill Cipher is the classic cryptographic algorithm. It is very
difficult to be solved by cryptanalyst if we have the ciphertext
only. However, this technique can be solved quite easily when
the cryptanalyst has the ciphertext file and a plaintext file
chunks. Cryptanalysis technique is called known-plaintext
attack [6].
(1)
Where :
N
TP
TC
:
:
:
Integer Number
Total pixel in a specific segment
Maximum value of modular expression
The total pixel is obtained from how many red colors in the
segment. The computer program calculates the red pixel one by
one and store to the variable. It changes the pixels to characters.
We have decided to change the white color to . while the red
to X. If we see the following figure, it is like a magnification.
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
...................................X.XX.
......................................XX
....................................X...
........................................
..............................X......X.X
...............................XX..X.XXX
...................................XXX..
.....................................X..
............................XX.X........
................................XX.....X
..............................X.XX.....X
.................................XXX.XXX
........................X.........XX.XXX
......................XXXXX.......XX....
............................XXXXXXX.X...
................................XXX.XXXX
.......................X.............XXX
....................X..X..XX....X.X.....
.........................X......X....XXX
............................X..XX....X..
...................XXXXX...XX..XX..XXXXX
....................XXXX...X.XXXXXXXXXXX
................XX...X........XX.XXX.XXX
.....................X.XX.......XXX....X
......................XXXXXXXXXXX.XXXX.X
.............X.XX.XX.XX.XX.X.XXXXXXXXXXX
.............XXXXXXXXXXX....XXXX.XXXXXXX
............X............XXXXXXXXXXX..X.
..........................XXXXXXXXXXXX.X
...............XX..XX.XXX..XXXX.XXXXXXXX
.......X...XXXX....XX.XX..XXXXX..XXX..XX
.................XXXXX.......XXXXXXX....
....................XXXXXXXXXXXXXXXXXXXX
...................XXX.XXXXXXXXXXXXXXX..
.............XXX..XXX.XXXXX...XXX.XXX..X
.......X.XX.XXXXX....XXXXXXXXX.XX.XX.XXX
.................XXXXXXXXX.XXX..XXXXX.XX
.........XX...X......XXXXX.XX...XX..X.XX
.........XX.XXXXXXXX..XXX....XXXXXXX.XXX
.............XX..XXXXXXXXX.XXXXXXXXXXXX.
.............X....X.X...XXXXX.X.XXXXXX..
..........XXXX.X...X..XXXXX...XXXXXXX..X
........X......XXXXXXXXXXXX...XXXXXXX.XX
........X........X.XXXXXXXXXXXX.X.XXXXXX
.........X..XXXXXX...XX..XXXXXXXXX...XXX
....X.......XXXXXX.XXX.XXXXXXX.XXXXXXXXX
..................XXXXXXXX.XX.X.XXXXXX.X
.........XXX.XXXXXXX..XXX.XXXXXX.XXX...X
.............XXXXXXX.XX.XX.XXXXXXXXX.XXX
........XX...X....X.XXX.XXX.XX...XXXXXXX
........XX.XXX.XXXXXXX..XXXXXX..X.X.XXXX
X11
X21
X31
Key
X12 X13
X22 X23
X32 X33
204
166
112
Key
242 227
248 223
220 84
Determinant
-1103880
248
124
214
241
Key
84
91
209 105
29
39
Determinant
-1961133
83
The set of the first threshold (200) generates 77, 242, 84, 163,
239, 241, 34, 235 and 220. It is in Table 4.
Table 4. Key of Threshold 200
77
163
34
Key
242 84
239 241
235 220
Determinant
-4472371
205
V. CONCLUSION
There are many ways to construct the key in Hill Cipher. One
of the techniques is using an image and threshold. The numbers
are adjustable to get the correct determinant. The fingerprint
has a plurality of segments. It has a pattern which consists of a
collection of dark and white pixels. We can utilize this situation
to produce the Hill Cipher key. The threshold can be set as
desired to generate the specific numbers. Afterward, the
numbers can be inserted into the Hill Cipher cells. By providing
the correct threshold, the decryption process can be carried out.
REFERENCES
[1] A. P. U. Siahaan, Three-Pass Protocol Concept in Hill
Cipher Encryption Technique, SNATI, Yogyakarta, 2016.
[2] A. P. U. Siahaan, RC4 Technique in Visual Cryptography
RGB Image Encryption, SNATIA, Semarang, 2016.
[3] L. H. Thai dan N. N. Tam, Fingerprint Recognition Using
Standardized Fingerprint Model, International Journal of
Computer Science, vol. 7, no. 3, pp. 11-17, 2010.
[4] S. S. Mudholkar, P. M. Shende dan M. V. Sarode,
Biometrics Authentication Technique For Intrusion
Detection Systems Using Fingerprint Recognition,
International Journal of Computer Science, Engineering
and Information Technology, vol. 2, no. 1, pp. 57-65,
2012.
[5] B. Forouzan, Cryptography and Network Security,
McGraw-Hill, 2006.
[6] H. Anton dan C. Rorres, Elementary Linear Algebra,
2011: John Wiley & Sons.